1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
9

Three PCs are on an Ethernet LAN, connected by a hub. Describe how the Ethernet protocol deals with collisions in this situation

. How would the situation change if the hub were replaced by a switch?
Computers and Technology
1 answer:
sdas [7]3 years ago
3 0

Answer:

All the ports in a hub are in the same collision domain and a hub sends frames from one host to all other hosts in the network. This makes it prone to collision and poor network throughput. Just like a network switch, it uses the CSMA/CD protocol to detect collision in its network.

A network switch reduces its collision domain to just a port and sends frames from one host to another using its mac table as a route. This makes the network very efficient with high throughput. It also uses the CSMA/CD protocol to detect collision

Explanation:

Switches and hubs are used in networking to connect computer devices in a network. A hub is an obsolete device networking that broadcast a frame to all other ports or host in the network except for the send host port. This increases the rate of collision as all the ports in a hub share the same collision domain. A switch is an efficient frame switching device in a network, which uses its MAC table to decide and find a destination host.

CSMA/CD is a collision detection protocol used in a network to detect and prevent a collision. With this protocol, a host is able to listen, wait, send and resend frames to prevent a collision.

You might be interested in
How do I do this? <br> Someone Please help
romanna [79]

Answer:

I am done solving there was a synthetic error very sorry I tried to help for 30mins

4 0
2 years ago
Common term is used by security testing professionals to describe vulnerabilities in a network?
Valentin [98]

Holes is a common term is used by security testing professionals to describe vulnerabilities in a network.

Therefore, the answer is Holes.

5 0
3 years ago
What is the term for code that keeps running as long as a certain condition is met?
Strike441 [17]

Answer: While loop​

hope this helps

-scav

4 0
3 years ago
In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format s
Wewaii [24]

Answer:

variable with a leading sign, three fractioned digits after the decimal point

5 0
3 years ago
FUNCTIONAL REQUIREMENTS FOR TRAVEL AGENCY SYSTEM
Katyanochek1 [597]

A minimum computer system with an Intel Pentium VI – 1000 MHz Processor or higher, at least 512MB of RAM, and at least 10 GB of hard disk space is required for server configuration in order for the Travel Agency System to be efficient and completely functioning.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    5·2 answers
  • What two different types of encryption can be used by ipsec during data transfer?​?
    5·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • Which network is the predecessor of the Internet?
    13·1 answer
  • What are some good invention names for an air filter?
    14·1 answer
  • What is meant by authorization? The decision to allow or deny a subject access to an object. The ability of a subject and an obj
    9·1 answer
  • HURYYYY
    6·2 answers
  • What's the best strategy for avoiding ATM fe
    14·1 answer
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • Application of optical fibre​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!